US4802084A - Address translator - Google Patents

Address translator Download PDF

Info

Publication number
US4802084A
US4802084A US06/827,545 US82754586A US4802084A US 4802084 A US4802084 A US 4802084A US 82754586 A US82754586 A US 82754586A US 4802084 A US4802084 A US 4802084A
Authority
US
United States
Prior art keywords
address
virtual
identifier
comparator
table origin
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
US06/827,545
Inventor
Hiroshi Ikegaya
Hidenori Umeno
Takashige Kubo
Yoshio Ukai
Nobuyoshi Sugama
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hitachi Ltd
Original Assignee
Hitachi Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hitachi Ltd filed Critical Hitachi Ltd
Assigned to HITACHI, LTD., A CORP. OF JAPAN reassignment HITACHI, LTD., A CORP. OF JAPAN ASSIGNMENT OF ASSIGNORS INTEREST. Assignors: IKEGAYA, HIROSHI, KUBO, TAKASHIGE, SUGAMA, NOBUYOSHI, UKAI, YOSHIO, UMENO, HIDENORI
Application granted granted Critical
Publication of US4802084A publication Critical patent/US4802084A/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/02Addressing or allocation; Relocation
    • G06F12/08Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
    • G06F12/10Address translation
    • G06F12/1027Address translation using associative or pseudo-associative address translation means, e.g. translation look-aside buffer [TLB]
    • G06F12/1036Address translation using associative or pseudo-associative address translation means, e.g. translation look-aside buffer [TLB] for multiple virtual address spaces, e.g. segmentation

Definitions

  • the present invention relates to a virtual machine system having a TLB (Translation Lookaside Buffer), and more particularly to an address Translator for such system.
  • TLB Translation Lookaside Buffer
  • the virtual machine system is a computer system which operates as if there were a plurality of computers under resources (processor, real storage, channel and I/O devices) of one real machine.
  • VMS virtual machine system
  • OS's operating systems
  • two operation modes, a privileged mode and a non-privileged mode in the real machine are utilized.
  • the privileged mode is used for the OS operation mode, but in the VMS, the privileged mode is used as a special control program (which is referred to as a virtual machine control program (VMCP)) operation mode to operate the OS in the non-privileged mode.
  • VMCP virtual machine control program
  • the plurality of virtual machines (hereinafter VM's) are simulated by the VMCP so that they are functionally equivalent to the real machine.
  • FIG. 2 shows a relationship between the address space and the address translation table when the OS executed on the VM adopts the virtual storage control.
  • the OS when the OS executes a program on the virtual storage which the OS prepared, it translates the address by using a translation table which the OS controls to execute the program.
  • the address which the OS on the VM translated is a virtual address when it is viewed from the VMCP and it is necessary for the VMCP to translate that address to an address on the real storage for execution.
  • the OS which carries out the virtual storage control is to be executed on the VM, a two-step address translation is necessary.
  • the VMCP reduces the overhead therefor by use of a shadow table to improve the processing efficiency.
  • the VMCP manages a table for translating the address on the virtual storage prepared by the OS directly to the address on the real storage. If either one of those two tables is modified, it must be reflected in the shadow table. The VMCP carries out this processing.
  • a segment table origin stack for realizing a multiple virtual storage system
  • a portion of segment table origin addresses for the OS or VMCP, space identifiers to constitute the multiple virtual storage and segment identifiers to identify the VM's are held in an entry of the stack
  • a TLB is constructed to hold the space/segment identifiers read from the segment table origin stack as the segment identifiers.
  • the corresponding space/segment identifier is compared with the space/segment identifier in the TLB entry to determine validity of the read-out TLB entry.
  • the necessary TLB entry may be invalidated because a common segment in the virtual machine cannot be determined.
  • a flag for indicating the common segment in the virtual machine and a system identifier are held in the TLB, and a VM identifier is held in a segment table origin stack.
  • a current VM identifier and the VM identifier of the segment table origin stack are compared to determine the validity of the TLB entry, and for a non-common segment, the system identifier read from the segment table origin stack and the system identifier in the TLB entry are compared to determine the validity of the TLB entry.
  • FIG. 1 is a conceptual chart of a conventional virtual machine system.
  • FIG. 2 shows a relationship between an address space and an address translation table in a VMS.
  • FIG. 3 shows a configuration of one embodiment of the present invention.
  • FIG. 4 shows one embodiment of an S-id selector of FIG. 3.
  • FIG. 1 shows a conceptual view of a conventional VMS.
  • a real machine 1 imparts a real machine interface capable of handling a processing request (machine instruction) in a privileged mode or non-privileged mode to a VMCP 4
  • the VMCP 4 responds thereto to impart other real machine interfaces to OS 311 and OS 321 of VM 31 and VM 32 to enable them. While only two VM's are shown in FIG. 1, the operation is the same when more than two VM's are included.
  • the OS 311 and OS 321 operate by way of the real machine interfaces imparted by the VM 31 and VM 32 so that they appear as if they had operated on the real machine 1.
  • the OS 311 and OS 321 impart extended machine interfaces to user programs 511, 521, 531 and 541.
  • Extended machines 51, 52, 53 and 54 are functions to execute processings for functional processing requests (supervisor calls) from the user programs, in the OS's for each OS, and machine instructions of the non-privileged mode.
  • the relation between the VMCP 4 and the VM's 31 and 32 is similar to a relationship between a control program and a processing program in the conventional OS.
  • the VMCP 4 corresponds to the control program and the VM's 31 and 32 correspond to the processing program.
  • the privilege instructions on the VM's 31 and 32 are reported to the VMCP 4 as privileged instruction exceptions and they are executed by the simulation by the VMCP 4.
  • An apparatus shown in FIG. 3 comprises a logical address register (LAR) 101, a segment table origin address register (STOR) 102, a VM identifier register (VMIDR) 103, an S-id selector 104, a system identifier register 105, a translation lookaside buffer (TLB) 106, comparators 107 and 108, AND gates 109 and 110, an OR gate 111, a physical address register (PAR) 112 and an address translator 113.
  • LAR logical address register
  • STOR segment table origin address register
  • VMIDR VM identifier register
  • S-id selector 104 S-id selector
  • system 105 system identifier register
  • TLB translation lookaside buffer
  • comparators 107 and 108 AND gates 109 and 110
  • OR gate 111 OR gate 111
  • PAR physical address register
  • PAR physical address register
  • the address on the virtual storage is set in the LAR 101
  • the segment origin address (STO) of the OS or the VMCP is set in the STOR 102
  • the VM identifier (VM-id) is set in the VMIDR 103.
  • the system identifier (S-id) read from the S-id selector 104 is set in the system identifier register 105.
  • the L1 portion of the LAR 101 is stored in the L1 field of the TLB 106, and the content of the system identifier register 105 is stored in the S-id field of the TLB 106.
  • the physical address translated by the address translator 113 is stored in the PA field through a data line 301, and the value "1" is stored in the C field through a data line 302 when the address translated by the address translator 113 is the common segment, and the value "0" is stored through the data line 302 when the address is the non-common segment.
  • the apparatus of FIG. 3 operates as follows.
  • the entry of the TLB 106 is designated by the L2 portion of the logical address set in the LAR 101.
  • the L1 portion of the LAR 101 is compared with the L1 field of the TLB 106 by the comparator 107 which produces an output value "1" when both are equal.
  • the content of the system identifier register 105 is compared with the system identifier stored in the S-id field of the TLB 106 by the comparator 108 which produces an output value "1" when both are equal.
  • the VM-id of the VMIDR 103 is compared with the VM-id stored in the STO stack by the S-id selector 104 which produces a "1" output through a signal line 303 when both are equal.
  • the AND gate 109 produces an output value "1".
  • the AND gate 110 produces an output value "1" when the output value of the comparator 107 and the output value on the signal line 303 are "1" and the C field of the TLB 106 is value "1”, that is, when the VM-id's are equal and the C field of the TLB 106 indicates the common segment.
  • FIG. 4 shows an embodiment of the S-id selector 104 of FIG. 3.
  • the selector of FIG. 4 operates as follows.
  • the entry of the STO stack 201 is designated by the S2 portion of the segment table origin address set in the STOR 102.
  • the S1 portion of the STOR 102 is compared with the S1 portion of the STO stack 201 by the comparator 202 which produces an output value "1" when both are equal.
  • the VM-id of the VMIDR 103 is compared with the VM-id field of the STO stack 201 by the comparator 203 which produces an output value "1" through a signal line 303 when both are equal.
  • the output value of the AND gate 204 is "1".
  • the S-id field of the corresponding entry of the STO stack 201 is enabled and the value of S-id field is set in the system identifier register 105.
  • the common segment can be identified by using the TLB.
  • the flag which indicates the common segment is held in the TLB, and the VM identifier and the system identifier are held in the segent table origin stack so that the common segment can be identified by using the TLB. Accordingly, the overhead to support the virtual storage function of the OS can be reduced and the performance of the VMS can be improved.

Abstract

In order to carry out address translation which can reduce an overhead of the VMCP to support a virtual storage, a flag indicating a common segment in the virtual machine and a system identifier are held in a TLB, and a VM identifier is held in a segment table origin stack. For the common segment, a current VM identifier is compared with the VM identifier in the segment table origin stack to determine validity of a TLB entry, and for a non-common segment, a system identifier read from the segment table origin stack is compared with the system identifier in the TLB entry to determine validity of the TLB entry.

Description

BACKGROUND OF THE INVENTION
The present invention relates to a virtual machine system having a TLB (Translation Lookaside Buffer), and more particularly to an address Translator for such system.
The virtual machine system is a computer system which operates as if there were a plurality of computers under resources (processor, real storage, channel and I/O devices) of one real machine. In the virtual machine system (hereinafter VMS), a number of operating systems (OS's) can apparently simultaneously run on one real machine so that all resources including the main storage and the I/O devices as well as the processor are shared by the OS's. To this end, two operation modes, a privileged mode and a non-privileged mode in the real machine are utilized. Normally, the privileged mode is used for the OS operation mode, but in the VMS, the privileged mode is used as a special control program (which is referred to as a virtual machine control program (VMCP)) operation mode to operate the OS in the non-privileged mode. The plurality of virtual machines (hereinafter VM's) are simulated by the VMCP so that they are functionally equivalent to the real machine.
FIG. 2 shows a relationship between the address space and the address translation table when the OS executed on the VM adopts the virtual storage control.
In FIG. 2, when the OS executes a program on the virtual storage which the OS prepared, it translates the address by using a translation table which the OS controls to execute the program. However, where the OS is executed on the VM, the address which the OS on the VM translated is a virtual address when it is viewed from the VMCP and it is necessary for the VMCP to translate that address to an address on the real storage for execution. When the OS which carries out the virtual storage control is to be executed on the VM, a two-step address translation is necessary. The VMCP reduces the overhead therefor by use of a shadow table to improve the processing efficiency. The VMCP manages a table for translating the address on the virtual storage prepared by the OS directly to the address on the real storage. If either one of those two tables is modified, it must be reflected in the shadow table. The VMCP carries out this processing.
As disclosed in Japanese Unexamined Patent Publication No. 55-113182, in order to reduce the overhead of the VMCP to support the OS virtual storage, a segment table origin stack for realizing a multiple virtual storage system is provided, and a portion of segment table origin addresses for the OS or VMCP, space identifiers to constitute the multiple virtual storage and segment identifiers to identify the VM's are held in an entry of the stack, and a TLB is constructed to hold the space/segment identifiers read from the segment table origin stack as the segment identifiers. When the TLB is read, the corresponding space/segment identifier is compared with the space/segment identifier in the TLB entry to determine validity of the read-out TLB entry.
In this method, however, the necessary TLB entry may be invalidated because a common segment in the virtual machine cannot be determined.
SUMMARY OF THE INVENTION
It is an object of the present invention to provide an address translator which reduces the overhead necessary to support an OS virtual storage by identifying a common segment in the OS by using a TLB in a virtual machine system.
In the address translator of the present invention, a flag for indicating the common segment in the virtual machine and a system identifier are held in the TLB, and a VM identifier is held in a segment table origin stack. For the common segment, a current VM identifier and the VM identifier of the segment table origin stack are compared to determine the validity of the TLB entry, and for a non-common segment, the system identifier read from the segment table origin stack and the system identifier in the TLB entry are compared to determine the validity of the TLB entry.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a conceptual chart of a conventional virtual machine system.
FIG. 2 shows a relationship between an address space and an address translation table in a VMS.
FIG. 3 shows a configuration of one embodiment of the present invention.
FIG. 4 shows one embodiment of an S-id selector of FIG. 3.
DESCRIPTION OF THE PREFERRED EMBODIMENTS
In order to facilitate the understanding of the present invention, a virtual machine system to which the present invention is applied is explained with reference to FIG. 1.
FIG. 1 shows a conceptual view of a conventional VMS. When a real machine 1 imparts a real machine interface capable of handling a processing request (machine instruction) in a privileged mode or non-privileged mode to a VMCP 4, the VMCP 4 responds thereto to impart other real machine interfaces to OS 311 and OS 321 of VM 31 and VM 32 to enable them. While only two VM's are shown in FIG. 1, the operation is the same when more than two VM's are included. The OS 311 and OS 321 operate by way of the real machine interfaces imparted by the VM 31 and VM 32 so that they appear as if they had operated on the real machine 1. The OS 311 and OS 321 impart extended machine interfaces to user programs 511, 521, 531 and 541. Extended machines 51, 52, 53 and 54 are functions to execute processings for functional processing requests (supervisor calls) from the user programs, in the OS's for each OS, and machine instructions of the non-privileged mode. The relation between the VMCP 4 and the VM's 31 and 32 is similar to a relationship between a control program and a processing program in the conventional OS. The VMCP 4 corresponds to the control program and the VM's 31 and 32 correspond to the processing program. Since the VM's 31 and 32 generated by the VMCP 4 is executed in the non-privileged mode, the privilege instructions on the VM's 31 and 32 are reported to the VMCP 4 as privileged instruction exceptions and they are executed by the simulation by the VMCP 4.
An apparatus shown in FIG. 3 comprises a logical address register (LAR) 101, a segment table origin address register (STOR) 102, a VM identifier register (VMIDR) 103, an S-id selector 104, a system identifier register 105, a translation lookaside buffer (TLB) 106, comparators 107 and 108, AND gates 109 and 110, an OR gate 111, a physical address register (PAR) 112 and an address translator 113.
The address on the virtual storage is set in the LAR 101, the segment origin address (STO) of the OS or the VMCP is set in the STOR 102, and the VM identifier (VM-id) is set in the VMIDR 103. The system identifier (S-id) read from the S-id selector 104 is set in the system identifier register 105. The L1 portion of the LAR 101 is stored in the L1 field of the TLB 106, and the content of the system identifier register 105 is stored in the S-id field of the TLB 106. The physical address translated by the address translator 113 is stored in the PA field through a data line 301, and the value "1" is stored in the C field through a data line 302 when the address translated by the address translator 113 is the common segment, and the value "0" is stored through the data line 302 when the address is the non-common segment.
The apparatus of FIG. 3 operates as follows. The entry of the TLB 106 is designated by the L2 portion of the logical address set in the LAR 101. The L1 portion of the LAR 101 is compared with the L1 field of the TLB 106 by the comparator 107 which produces an output value "1" when both are equal. The content of the system identifier register 105 is compared with the system identifier stored in the S-id field of the TLB 106 by the comparator 108 which produces an output value "1" when both are equal. The VM-id of the VMIDR 103 is compared with the VM-id stored in the STO stack by the S-id selector 104 which produces a "1" output through a signal line 303 when both are equal.
When the output value of the comparator 107 and the output value of the comparator 108 are "1" and the C field of the TLB 106 is value "0", that is, when the system identifiers are equal and the C field of the TLB 105 indicates the non-common segment, the AND gate 109 produces an output value "1". When the output value of the comparator 107 and the output value on the signal line 303 are "1" and the C field of the TLB 106 is value "1", that is, when the VM-id's are equal and the C field of the TLB 106 indicates the common segment, the AND gate 110 produces an output value "1". When either one of the output values of the AND gates 109 and 110 are "1", the OR gate 111 produces an output value "1" through a signal line 305. When the signal line 305 is value "1", the PA field of the TLB 106 is set in the PAR 112. This means that the address translation by the TLB has succeeded. When both outputs of the AND gates 109 and 110 are value "0", the OR gate 111 produces an output value "1" through a signal line 304. When the signal line 304 is value "1", the physical address from the address translator 113 is set in the PAR 112.
FIG. 4 shows an embodiment of the S-id selector 104 of FIG. 3. The selector of FIG. 4 operates as follows. The entry of the STO stack 201 is designated by the S2 portion of the segment table origin address set in the STOR 102. The S1 portion of the STOR 102 is compared with the S1 portion of the STO stack 201 by the comparator 202 which produces an output value "1" when both are equal. The VM-id of the VMIDR 103 is compared with the VM-id field of the STO stack 201 by the comparator 203 which produces an output value "1" through a signal line 303 when both are equal. When the output value of the comparator 202 and the output value of the comparator 203 are both "1", the output value of the AND gate 204 is "1". When the output value of the AND gate 204 is "1", the S-id field of the corresponding entry of the STO stack 201 is enabled and the value of S-id field is set in the system identifier register 105.
In accordance with the present embodiment, the common segment can be identified by using the TLB.
In accordance with the present invention, the flag which indicates the common segment is held in the TLB, and the VM identifier and the system identifier are held in the segent table origin stack so that the common segment can be identified by using the TLB. Accordingly, the overhead to support the virtual storage function of the OS can be reduced and the performance of the VMS can be improved.

Claims (3)

We claim:
1. An address translator for translating a virtual address into a corresponding physical address for use in a virtual machine system having a control program for simultaneously operating plural virtual machines with respective operating systems on one real machine, each of said operating systems holding a first identifier for identifying a virtual machine on which the operating system runs, comprising:
a segment table origin stack for storing therein identification entries each containing a portion of a segment table origin address for a virtual address, a first identifier and a second identifier representative of a combination of said segment table origin address for a virtual address and said first identifier;
a first comparator for comparing a first identifier for a virtual machine on which a current operation is running with each of said first identifiers stored in said segment table origin stack;
a second comparator for comparing a portion of a segment table origin address for a virtual address specified by said running program with each of the portions of segment table origin addresses for virtual address stored in said segment table origin stack;
an AND gate coupled to receive the outputs of said first and second comparators;
an address translation buffer for storing therein address translation entries each containing a portion of a virtual address, a physical address corresponding to the virtual address, a second identifier and a flag indicative of whether or not said virtual address belongs to a common segment in a virtual machine;
a third comparator for comparing a second identifier read out, in response to the output of said AND gate, from said segment table origin stack in association with the portion of a segment table origin address for said virtual address specified by said running program with each of said second identifiers stored in said address translation buffer; and
selection means coupled to the outputs of said first and third comparators and responsive to said flag in said address translation buffer for delivering the output of said first comparator when said flag indicates that said virtual address specified by said running program belongs to a common segment and for delivering the output of said third comparator when said flag indicates that said virtual address specified by said running program does not belong to a common segment, whereby that one of said physical addresses stored in said address translation buffer which corresponds to the virtual address specified by said running program is delivered in response to the output of said selection means.
2. An address translator according to claim 1, in which said selection means includes a second AND gate coupled to receive the output of said first comparator and a flag signal representative of said flag read out from said address translation buffer, a third AND gate coupled to receive the output of said third comparator and said flag signal, and an OR gate coupled to receive the outputs of said second and third AND gates for generating a signal as said output signal of said selection means.
3. An address translator according to claim 2, further comprising a fourth comparator for comparing a portion of said virtual address specified by said running program with each of the portions of said virtual addresses stored in said address translation buffer, the output of said fourth comparator being coupled to said second and third AND gates.
US06/827,545 1985-03-11 1986-02-10 Address translator Expired - Lifetime US4802084A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP60046549A JPS61206057A (en) 1985-03-11 1985-03-11 Address converting device
JP60-46549 1985-03-11

Publications (1)

Publication Number Publication Date
US4802084A true US4802084A (en) 1989-01-31

Family

ID=12750393

Family Applications (1)

Application Number Title Priority Date Filing Date
US06/827,545 Expired - Lifetime US4802084A (en) 1985-03-11 1986-02-10 Address translator

Country Status (2)

Country Link
US (1) US4802084A (en)
JP (1) JPS61206057A (en)

Cited By (104)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4887202A (en) * 1985-07-31 1989-12-12 Hitachi, Ltd. Input-output control method in a virtual machine system
US4961135A (en) * 1986-12-24 1990-10-02 Kabushiki Kaisha Toshiba Translation lookaside buffer control system
US5077654A (en) * 1987-12-11 1991-12-31 Hitachi, Ltd. Virtual machine system which translates virtual address from a selected virtual machine into real address of main storage
US5129071A (en) * 1988-04-06 1992-07-07 Hitachi, Ltd. Address translation apparatus in virtual machine system using a space identifier field for discriminating datoff (dynamic address translation off) virtual machines
WO1993000636A1 (en) * 1991-06-28 1993-01-07 Digital Equipment Corporation Translation buffer for virtual machines with address space match
US5239635A (en) * 1988-06-06 1993-08-24 Digital Equipment Corporation Virtual address to physical address translation using page tables in virtual memory
US5295251A (en) * 1989-09-21 1994-03-15 Hitachi, Ltd. Method of accessing multiple virtual address spaces and computer system
US5317710A (en) * 1987-07-24 1994-05-31 Hitachi, Ltd. Invalidation of entries in a translation table by providing the machine a unique identification thereby disallowing a match and rendering the entries invalid
US5329629A (en) * 1989-07-03 1994-07-12 Tandem Computers Incorporated Apparatus and method for reading, writing, and refreshing memory with direct virtual or physical access
US5341484A (en) * 1988-11-02 1994-08-23 Hitachi, Ltd. Virtual machine system having an extended storage
US5437016A (en) * 1991-07-05 1995-07-25 Hitachi, Ltd. Apparatus and method for translating logical addresses for virtual machines
US5504857A (en) * 1990-06-08 1996-04-02 International Business Machines Highly available fault tolerant relocation of storage with atomicity
US5530821A (en) * 1991-08-02 1996-06-25 Canon Kabushiki Kaisha Method and apparatus including independent virtual address translation
US5555385A (en) * 1993-10-27 1996-09-10 International Business Machines Corporation Allocation of address spaces within virtual machine compute system
US5970512A (en) * 1997-03-27 1999-10-19 International Business Machines Corporation Translation shadow array adder-decoder circuit for selecting consecutive TLB entries
US20020083110A1 (en) * 2000-12-27 2002-06-27 Michael Kozuch Mechanism for providing power management through virtualization
US20020082824A1 (en) * 2000-12-27 2002-06-27 Gilbert Neiger Virtual translation lookaside buffer
US20020083332A1 (en) * 2000-12-22 2002-06-27 Grawrock David W. Creation and distribution of a secret value between two devices
US20020087877A1 (en) * 2000-12-28 2002-07-04 Grawrock David W. Platform and method of creating a secure boot that enforces proper user authentication and enforces hardware configurations
US20020144121A1 (en) * 2001-03-30 2002-10-03 Ellison Carl M. Checking file integrity using signature generated in isolated execution
US20020143842A1 (en) * 2001-03-30 2002-10-03 Erik Cota-Robles Method and apparatus for constructing host processor soft devices independent of the host processor operating system
US20020144140A1 (en) * 2001-03-30 2002-10-03 Ellison Carl M. File checking using remote signing authority via a network
US20030037089A1 (en) * 2001-08-15 2003-02-20 Erik Cota-Robles Tracking operating system process and thread execution and virtual machine execution in hardware or in a virtual machine monitor
US20030074541A1 (en) * 2001-09-28 2003-04-17 International Business Machines Corporation Table offset for shortening translation tables from their beginnings
US20030084346A1 (en) * 2001-11-01 2003-05-01 Kozuch Michael A. Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment
US20030115453A1 (en) * 2001-12-17 2003-06-19 Grawrock David W. Connecting a virtual token to a physical token
US20030126454A1 (en) * 2001-12-28 2003-07-03 Glew Andrew F. Authenticated code method and apparatus
US20030126453A1 (en) * 2001-12-31 2003-07-03 Glew Andrew F. Processor supporting execution of an authenticated code instruction
US20030126442A1 (en) * 2001-12-31 2003-07-03 Glew Andrew F. Authenticated code module
US20030163662A1 (en) * 2002-02-25 2003-08-28 Andy Glew Method and apparatus for translating guest physical addresses in a virtual machine environment
US20030163711A1 (en) * 2002-02-22 2003-08-28 Grawrock David W. Multi-token seal and unseal
US20030188165A1 (en) * 2002-03-29 2003-10-02 Sutton James A. System and method for execution of a secured environment initialization instruction
US20030188113A1 (en) * 2002-03-29 2003-10-02 Grawrock David W. System and method for resetting a platform configuration register
US20030191943A1 (en) * 2002-04-05 2003-10-09 Poisner David I. Methods and arrangements to register code
US20030196096A1 (en) * 2002-04-12 2003-10-16 Sutton James A. Microcode patch authentication
US20030196088A1 (en) * 2002-04-15 2003-10-16 Poisner David I. Method and apparatus for communicating securely with a token
US20030196083A1 (en) * 2002-04-15 2003-10-16 Grawrock David W. Validation of inclusion of a platform within a data center
US20030196100A1 (en) * 2002-04-15 2003-10-16 Grawrock David W. Protection against memory attacks following reset
US20030204693A1 (en) * 2002-04-30 2003-10-30 Moran Douglas R. Methods and arrangements to interface memory
US20030217250A1 (en) * 2002-04-16 2003-11-20 Steve Bennett Control register access virtualization performance improvement in the virtual-machine architecture
US20030229794A1 (en) * 2002-06-07 2003-12-11 Sutton James A. System and method for protection against untrusted system management code by redirecting a system management interrupt and creating a virtual machine container
US20030233550A1 (en) * 2002-06-18 2003-12-18 Brickell Ernie F. Method of confirming a secure key exchange
US20040003321A1 (en) * 2002-06-27 2004-01-01 Glew Andrew F. Initialization of protected system
US20040003273A1 (en) * 2002-06-26 2004-01-01 Grawrock David W. Sleep protection
US20040003323A1 (en) * 2002-06-29 2004-01-01 Steve Bennett Control over faults occurring during the operation of guest software in the virtual-machine architecture
US20040003324A1 (en) * 2002-06-29 2004-01-01 Richard Uhlig Handling faults associated with operation of guest software in the virtual-machine architecture
US20040010788A1 (en) * 2002-07-12 2004-01-15 Cota-Robles Erik C. System and method for binding virtual machines to hardware contexts
US20040064813A1 (en) * 2000-12-27 2004-04-01 Gilbert Neiger Method for resolving address space conflicts between a virtual machine monitor and a guest operating system
US20040078590A1 (en) * 2000-03-31 2004-04-22 Ellison Carl M. Controlling access to multiple memory zones in an isolated execution environment
US20040103281A1 (en) * 2002-11-27 2004-05-27 Brickell Ernie F. System and method for establishing trust without revealing identity
US20040117318A1 (en) * 2002-12-16 2004-06-17 Grawrock David W. Portable token controlling trusted environment launch
US20040117532A1 (en) * 2002-12-11 2004-06-17 Bennett Steven M. Mechanism for controlling external interrupts in a virtual machine system
US20040117593A1 (en) * 2002-12-12 2004-06-17 Richard Uhlig Reclaiming existing fields in address translation data structures to extend control over memory acceses
US20040128469A1 (en) * 2002-12-27 2004-07-01 Hall Clifford D. Mechanism for remapping post virtual machine memory pages
US20040128528A1 (en) * 2002-12-31 2004-07-01 Poisner David I. Trusted real time clock
US20040128549A1 (en) * 2002-12-31 2004-07-01 Poisner David I. Trusted system clock
US20040128345A1 (en) * 2002-12-27 2004-07-01 Robinson Scott H. Dynamic service registry
US6820177B2 (en) 2002-06-12 2004-11-16 Intel Corporation Protected configuration space in a protected environment
US20050044292A1 (en) * 2003-08-19 2005-02-24 Mckeen Francis X. Method and apparatus to retain system control when a buffer overflow attack occurs
US20050060702A1 (en) * 2003-09-15 2005-03-17 Bennett Steven M. Optimizing processor-managed resources based on the behavior of a virtual machine monitor
US20050071840A1 (en) * 2003-09-15 2005-03-31 Gilbert Neiger Use of multiple virtual machine monitors to handle privileged events
US20050069135A1 (en) * 2003-09-30 2005-03-31 Brickell Ernie F. Platform and method for establishing trust without revealing identity
US20050080970A1 (en) * 2003-09-30 2005-04-14 Stalinselvaraj Jeyasingh Chipset support for managing hardware interrupts in a virtual machine system
US20050080965A1 (en) * 2003-09-30 2005-04-14 Bennett Steven M. Mechanism to control hardware interrupt acknowledgement in a virtual machine system
US20050084098A1 (en) * 2003-09-18 2005-04-21 Brickell Ernie F. Method of obscuring cryptographic computations
US20050086508A1 (en) * 2003-09-19 2005-04-21 Moran Douglas R. Prioritized address decoder
US20050108534A1 (en) * 2003-11-19 2005-05-19 Bajikar Sundeep M. Providing services to an open platform implementing subscriber identity module (SIM) capabilities
US20050108497A1 (en) * 2003-11-14 2005-05-19 International Business Machines Corporation Translation look aside buffer (TLB) with increased translational capacity for multi-threaded computer processes
US20050108532A1 (en) * 2003-11-17 2005-05-19 Bajikar Sundeep M. Method and system to provide a trusted channel within a computer system for a SIM device
US20050133582A1 (en) * 2003-12-22 2005-06-23 Bajikar Sundeep M. Method and apparatus for providing a trusted time stamp in an open platform
US20050137898A1 (en) * 2003-12-22 2005-06-23 Wood Matthew D. Replacing blinded authentication authority
US20050152539A1 (en) * 2004-01-12 2005-07-14 Brickell Ernie F. Method of protecting cryptographic operations from side channel attacks
US20050188198A1 (en) * 2000-03-31 2005-08-25 Ellison Carl M. Managing a secure platform using a hierarchical executive architecture in isolated execution mode
US20050216920A1 (en) * 2004-03-24 2005-09-29 Vijay Tewari Use of a virtual machine to emulate a hardware device
US20050240819A1 (en) * 2004-03-30 2005-10-27 Bennett Steven M Providing support for single stepping a virtual machine in a virtual machine environment
US20050240700A1 (en) * 2004-03-31 2005-10-27 Bennett Steven M Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment
US6976162B1 (en) 2000-06-28 2005-12-13 Intel Corporation Platform and method for establishing provable identities while maintaining privacy
US20050283660A1 (en) * 2000-09-28 2005-12-22 Mckeen Francis X Mechanism to handle events in a machine with isolated execution
US20050288056A1 (en) * 2004-06-29 2005-12-29 Bajikar Sundeep M System including a wireless wide area network (WWAN) module with an external identity module reader and approach for certifying the WWAN module
US20060005084A1 (en) * 2004-06-30 2006-01-05 Gilbert Neiger Support for nested faults in a virtual machine environment
US6990579B1 (en) 2000-03-31 2006-01-24 Intel Corporation Platform and method for remote attestation of a platform
US6996710B1 (en) 2000-03-31 2006-02-07 Intel Corporation Platform and method for issuing and certifying a hardware-protected attestation key
US7013484B1 (en) 2000-03-31 2006-03-14 Intel Corporation Managing a secure environment using a chipset in isolated execution mode
US20060075402A1 (en) * 2004-09-30 2006-04-06 Gilbert Neiger Providing support for a timer associated with a virtual machine monitor
US20060117181A1 (en) * 2004-11-30 2006-06-01 Brickell Ernest F Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information
US7082615B1 (en) 2000-03-31 2006-07-25 Intel Corporation Protecting software environment in isolated execution
US7089418B1 (en) 2000-03-31 2006-08-08 Intel Corporation Managing accesses in a processor for isolated execution
US7111176B1 (en) 2000-03-31 2006-09-19 Intel Corporation Generating isolated bus cycles for isolated execution
US20060236371A1 (en) * 2004-12-29 2006-10-19 Fish Andrew J Mechanism to determine trust of out-of-band management agents
US7287197B2 (en) 2003-09-15 2007-10-23 Intel Corporation Vectoring an interrupt or exception upon resuming operation of a virtual machine
US7318235B2 (en) 2002-12-16 2008-01-08 Intel Corporation Attestation using both fixed token and portable token
US7356817B1 (en) 2000-03-31 2008-04-08 Intel Corporation Real-time scheduling of virtual machines
US7389427B1 (en) 2000-09-28 2008-06-17 Intel Corporation Mechanism to secure computer output from software attack using isolated execution
US7395405B2 (en) 2005-01-28 2008-07-01 Intel Corporation Method and apparatus for supporting address translation in a virtual machine environment
US7490070B2 (en) 2004-06-10 2009-02-10 Intel Corporation Apparatus and method for proving the denial of a direct proof signature
US7631196B2 (en) 2002-02-25 2009-12-08 Intel Corporation Method and apparatus for loading a trustable operating system
US7802085B2 (en) 2004-02-18 2010-09-21 Intel Corporation Apparatus and method for distributing private keys to an entity with minimal secret, unique information
US7809957B2 (en) 2005-09-29 2010-10-05 Intel Corporation Trusted platform module for generating sealed data
US7818808B1 (en) 2000-12-27 2010-10-19 Intel Corporation Processor mode for limiting the operation of guest software running on a virtual machine supported by a virtual machine monitor
US8014530B2 (en) 2006-03-22 2011-09-06 Intel Corporation Method and apparatus for authenticated, recoverable key distribution with no database secrets
US8028062B1 (en) * 2007-12-26 2011-09-27 Emc Corporation Non-disruptive data mobility using virtual storage area networks with split-path virtualization
US8146078B2 (en) 2004-10-29 2012-03-27 Intel Corporation Timer offsetting mechanism in a virtual machine environment
US8156343B2 (en) 2003-11-26 2012-04-10 Intel Corporation Accessing private data about the state of a data processing machine from storage that is publicly accessible
US8543772B2 (en) 2003-09-30 2013-09-24 Intel Corporation Invalidating translation lookaside buffer entries in a virtual machine (VM) system

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5246014B2 (en) * 2009-04-22 2013-07-24 富士通株式会社 Virtualization program, virtualization processing method and apparatus

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4096573A (en) * 1977-04-25 1978-06-20 International Business Machines Corporation DLAT Synonym control means for common portions of all address spaces
US4355355A (en) * 1980-03-19 1982-10-19 International Business Machines Corp. Address generating mechanism for multiple virtual spaces
US4456954A (en) * 1981-06-15 1984-06-26 International Business Machines Corporation Virtual machine system with guest architecture emulation using hardware TLB's for plural level address translations
US4459661A (en) * 1978-09-18 1984-07-10 Fujitsu Limited Channel address control system for a virtual machine system
US4521846A (en) * 1981-02-20 1985-06-04 International Business Machines Corporation Mechanism for accessing multiple virtual address spaces
US4564903A (en) * 1983-10-05 1986-01-14 International Business Machines Corporation Partitioned multiprocessor programming system
US4589092A (en) * 1983-12-12 1986-05-13 International Business Machines Corporation Data buffer having separate lock bit storage array
US4597044A (en) * 1982-10-14 1986-06-24 Honeywell Information Systems, Inc. Apparatus and method for providing a composite descriptor in a data processing system
US4612612A (en) * 1983-08-30 1986-09-16 Amdahl Corporation Virtually addressed cache
US4649479A (en) * 1985-02-28 1987-03-10 International Business Machines Corp. Device driver and adapter binding technique
US4660144A (en) * 1985-05-23 1987-04-21 International Business Machines Corp. Adjunct machine
US4674038A (en) * 1984-12-28 1987-06-16 International Business Machines Corporation Recovery of guest virtual machines after failure of a host real machine
US4695950A (en) * 1984-09-17 1987-09-22 International Business Machines Corporation Fast two-level dynamic address translation method and means
JPH113182A (en) * 1997-06-13 1999-01-06 Nec Corp Disk array system

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4096573A (en) * 1977-04-25 1978-06-20 International Business Machines Corporation DLAT Synonym control means for common portions of all address spaces
US4459661A (en) * 1978-09-18 1984-07-10 Fujitsu Limited Channel address control system for a virtual machine system
US4355355A (en) * 1980-03-19 1982-10-19 International Business Machines Corp. Address generating mechanism for multiple virtual spaces
US4521846A (en) * 1981-02-20 1985-06-04 International Business Machines Corporation Mechanism for accessing multiple virtual address spaces
US4456954A (en) * 1981-06-15 1984-06-26 International Business Machines Corporation Virtual machine system with guest architecture emulation using hardware TLB's for plural level address translations
US4597044A (en) * 1982-10-14 1986-06-24 Honeywell Information Systems, Inc. Apparatus and method for providing a composite descriptor in a data processing system
US4612612A (en) * 1983-08-30 1986-09-16 Amdahl Corporation Virtually addressed cache
US4564903A (en) * 1983-10-05 1986-01-14 International Business Machines Corporation Partitioned multiprocessor programming system
US4589092A (en) * 1983-12-12 1986-05-13 International Business Machines Corporation Data buffer having separate lock bit storage array
US4695950A (en) * 1984-09-17 1987-09-22 International Business Machines Corporation Fast two-level dynamic address translation method and means
US4674038A (en) * 1984-12-28 1987-06-16 International Business Machines Corporation Recovery of guest virtual machines after failure of a host real machine
US4649479A (en) * 1985-02-28 1987-03-10 International Business Machines Corp. Device driver and adapter binding technique
US4660144A (en) * 1985-05-23 1987-04-21 International Business Machines Corp. Adjunct machine
JPH113182A (en) * 1997-06-13 1999-01-06 Nec Corp Disk array system

Cited By (193)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4887202A (en) * 1985-07-31 1989-12-12 Hitachi, Ltd. Input-output control method in a virtual machine system
US4961135A (en) * 1986-12-24 1990-10-02 Kabushiki Kaisha Toshiba Translation lookaside buffer control system
US5317710A (en) * 1987-07-24 1994-05-31 Hitachi, Ltd. Invalidation of entries in a translation table by providing the machine a unique identification thereby disallowing a match and rendering the entries invalid
US5077654A (en) * 1987-12-11 1991-12-31 Hitachi, Ltd. Virtual machine system which translates virtual address from a selected virtual machine into real address of main storage
US5129071A (en) * 1988-04-06 1992-07-07 Hitachi, Ltd. Address translation apparatus in virtual machine system using a space identifier field for discriminating datoff (dynamic address translation off) virtual machines
US5239635A (en) * 1988-06-06 1993-08-24 Digital Equipment Corporation Virtual address to physical address translation using page tables in virtual memory
US5341484A (en) * 1988-11-02 1994-08-23 Hitachi, Ltd. Virtual machine system having an extended storage
US5329629A (en) * 1989-07-03 1994-07-12 Tandem Computers Incorporated Apparatus and method for reading, writing, and refreshing memory with direct virtual or physical access
US5295251A (en) * 1989-09-21 1994-03-15 Hitachi, Ltd. Method of accessing multiple virtual address spaces and computer system
US5504857A (en) * 1990-06-08 1996-04-02 International Business Machines Highly available fault tolerant relocation of storage with atomicity
US5319760A (en) * 1991-06-28 1994-06-07 Digital Equipment Corporation Translation buffer for virtual machines with address space match
AU654204B2 (en) * 1991-06-28 1994-10-27 Digital Equipment Corporation Translation buffer for virtual machines with address space match
WO1993000636A1 (en) * 1991-06-28 1993-01-07 Digital Equipment Corporation Translation buffer for virtual machines with address space match
US5437016A (en) * 1991-07-05 1995-07-25 Hitachi, Ltd. Apparatus and method for translating logical addresses for virtual machines
US5530821A (en) * 1991-08-02 1996-06-25 Canon Kabushiki Kaisha Method and apparatus including independent virtual address translation
US5555385A (en) * 1993-10-27 1996-09-10 International Business Machines Corporation Allocation of address spaces within virtual machine compute system
US5970512A (en) * 1997-03-27 1999-10-19 International Business Machines Corporation Translation shadow array adder-decoder circuit for selecting consecutive TLB entries
US6957332B1 (en) 2000-03-31 2005-10-18 Intel Corporation Managing a secure platform using a hierarchical executive architecture in isolated execution mode
US7082615B1 (en) 2000-03-31 2006-07-25 Intel Corporation Protecting software environment in isolated execution
US20050188198A1 (en) * 2000-03-31 2005-08-25 Ellison Carl M. Managing a secure platform using a hierarchical executive architecture in isolated execution mode
US7356817B1 (en) 2000-03-31 2008-04-08 Intel Corporation Real-time scheduling of virtual machines
US20040078590A1 (en) * 2000-03-31 2004-04-22 Ellison Carl M. Controlling access to multiple memory zones in an isolated execution environment
US7111176B1 (en) 2000-03-31 2006-09-19 Intel Corporation Generating isolated bus cycles for isolated execution
US6990579B1 (en) 2000-03-31 2006-01-24 Intel Corporation Platform and method for remote attestation of a platform
US6996710B1 (en) 2000-03-31 2006-02-07 Intel Corporation Platform and method for issuing and certifying a hardware-protected attestation key
US7013484B1 (en) 2000-03-31 2006-03-14 Intel Corporation Managing a secure environment using a chipset in isolated execution mode
US6934817B2 (en) 2000-03-31 2005-08-23 Intel Corporation Controlling access to multiple memory zones in an isolated execution environment
US7089418B1 (en) 2000-03-31 2006-08-08 Intel Corporation Managing accesses in a processor for isolated execution
US6941458B1 (en) 2000-03-31 2005-09-06 Intel Corporation Managing a secure platform using a hierarchical executive architecture in isolated execution mode
US20060080528A1 (en) * 2000-06-28 2006-04-13 Ellison Carl M Platform and method for establishing provable identities while maintaining privacy
US6976162B1 (en) 2000-06-28 2005-12-13 Intel Corporation Platform and method for establishing provable identities while maintaining privacy
US7516330B2 (en) 2000-06-28 2009-04-07 Intel Corporation Platform and method for establishing provable identities while maintaining privacy
US20050283660A1 (en) * 2000-09-28 2005-12-22 Mckeen Francis X Mechanism to handle events in a machine with isolated execution
US8671275B2 (en) 2000-09-28 2014-03-11 Intel Corporation Mechanism to handle events in a machine with isolated execution
US8522044B2 (en) 2000-09-28 2013-08-27 Intel Corporation Mechanism to handle events in a machine with isolated execution
US7793111B1 (en) 2000-09-28 2010-09-07 Intel Corporation Mechanism to handle events in a machine with isolated execution
US7389427B1 (en) 2000-09-28 2008-06-17 Intel Corporation Mechanism to secure computer output from software attack using isolated execution
US20100325445A1 (en) * 2000-09-28 2010-12-23 Mckeen Francis X Mechanism to handle events in a machine with isolated execution
US7215781B2 (en) 2000-12-22 2007-05-08 Intel Corporation Creation and distribution of a secret value between two devices
US20020083332A1 (en) * 2000-12-22 2002-06-27 Grawrock David W. Creation and distribution of a secret value between two devices
US7818808B1 (en) 2000-12-27 2010-10-19 Intel Corporation Processor mode for limiting the operation of guest software running on a virtual machine supported by a virtual machine monitor
US7225441B2 (en) 2000-12-27 2007-05-29 Intel Corporation Mechanism for providing power management through virtualization
US20020083110A1 (en) * 2000-12-27 2002-06-27 Michael Kozuch Mechanism for providing power management through virtualization
US20020082824A1 (en) * 2000-12-27 2002-06-27 Gilbert Neiger Virtual translation lookaside buffer
US7035963B2 (en) 2000-12-27 2006-04-25 Intel Corporation Method for resolving address space conflicts between a virtual machine monitor and a guest operating system
US7020738B2 (en) 2000-12-27 2006-03-28 Intel Corporation Method for resolving address space conflicts between a virtual machine monitor and a guest operating system
US20040064813A1 (en) * 2000-12-27 2004-04-01 Gilbert Neiger Method for resolving address space conflicts between a virtual machine monitor and a guest operating system
US6907600B2 (en) 2000-12-27 2005-06-14 Intel Corporation Virtual translation lookaside buffer
US7313669B2 (en) 2000-12-27 2007-12-25 Intel Corporation Virtual translation lookaside buffer
US20020087877A1 (en) * 2000-12-28 2002-07-04 Grawrock David W. Platform and method of creating a secure boot that enforces proper user authentication and enforces hardware configurations
US7117376B2 (en) 2000-12-28 2006-10-03 Intel Corporation Platform and method of creating a secure boot that enforces proper user authentication and enforces hardware configurations
US20020143842A1 (en) * 2001-03-30 2002-10-03 Erik Cota-Robles Method and apparatus for constructing host processor soft devices independent of the host processor operating system
US20020144140A1 (en) * 2001-03-30 2002-10-03 Ellison Carl M. File checking using remote signing authority via a network
US7272831B2 (en) 2001-03-30 2007-09-18 Intel Corporation Method and apparatus for constructing host processor soft devices independent of the host processor operating system
US7096497B2 (en) 2001-03-30 2006-08-22 Intel Corporation File checking using remote signing authority via a network
US20020144121A1 (en) * 2001-03-30 2002-10-03 Ellison Carl M. Checking file integrity using signature generated in isolated execution
US20030037089A1 (en) * 2001-08-15 2003-02-20 Erik Cota-Robles Tracking operating system process and thread execution and virtual machine execution in hardware or in a virtual machine monitor
US7191440B2 (en) 2001-08-15 2007-03-13 Intel Corporation Tracking operating system process and thread execution and virtual machine execution in hardware or in a virtual machine monitor
US6801993B2 (en) * 2001-09-28 2004-10-05 International Business Machines Corporation Table offset for shortening translation tables from their beginnings
US20030074541A1 (en) * 2001-09-28 2003-04-17 International Business Machines Corporation Table offset for shortening translation tables from their beginnings
US7921293B2 (en) 2001-11-01 2011-04-05 Intel Corporation Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment
US7024555B2 (en) 2001-11-01 2006-04-04 Intel Corporation Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment
US20030084346A1 (en) * 2001-11-01 2003-05-01 Kozuch Michael A. Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment
US20030115453A1 (en) * 2001-12-17 2003-06-19 Grawrock David W. Connecting a virtual token to a physical token
US7103771B2 (en) 2001-12-17 2006-09-05 Intel Corporation Connecting a virtual token to a physical token
US20030126454A1 (en) * 2001-12-28 2003-07-03 Glew Andrew F. Authenticated code method and apparatus
US20030126453A1 (en) * 2001-12-31 2003-07-03 Glew Andrew F. Processor supporting execution of an authenticated code instruction
US7308576B2 (en) 2001-12-31 2007-12-11 Intel Corporation Authenticated code module
US20030126442A1 (en) * 2001-12-31 2003-07-03 Glew Andrew F. Authenticated code module
US20030163711A1 (en) * 2002-02-22 2003-08-28 Grawrock David W. Multi-token seal and unseal
US7480806B2 (en) 2002-02-22 2009-01-20 Intel Corporation Multi-token seal and unseal
US7124273B2 (en) 2002-02-25 2006-10-17 Intel Corporation Method and apparatus for translating guest physical addresses in a virtual machine environment
US20100058075A1 (en) * 2002-02-25 2010-03-04 Kozuch Michael A Method and apparatus for loading a trustable operating system
US20030163662A1 (en) * 2002-02-25 2003-08-28 Andy Glew Method and apparatus for translating guest physical addresses in a virtual machine environment
US8407476B2 (en) 2002-02-25 2013-03-26 Intel Corporation Method and apparatus for loading a trustable operating system
US8386788B2 (en) 2002-02-25 2013-02-26 Intel Corporation Method and apparatus for loading a trustable operating system
US7631196B2 (en) 2002-02-25 2009-12-08 Intel Corporation Method and apparatus for loading a trustable operating system
US20100058076A1 (en) * 2002-02-25 2010-03-04 Kozuch Michael A Method and apparatus for loading a trustable operating system
US7028149B2 (en) 2002-03-29 2006-04-11 Intel Corporation System and method for resetting a platform configuration register
US20030188165A1 (en) * 2002-03-29 2003-10-02 Sutton James A. System and method for execution of a secured environment initialization instruction
US10175994B2 (en) 2002-03-29 2019-01-08 Intel Corporation System and method for execution of a secured environment initialization instruction
US10042649B2 (en) 2002-03-29 2018-08-07 Intel Corporation System and method for execution of a secured environment initialization instruction
US10031759B2 (en) 2002-03-29 2018-07-24 Intel Corporation System and method for execution of a secured environment initialization instruction
US9990208B2 (en) 2002-03-29 2018-06-05 Intel Corporation System and method for execution of a secured environment initialization instruction
US9361121B2 (en) 2002-03-29 2016-06-07 Intel Corporation System and method for execution of a secured environment initialization instruction
US20090259845A1 (en) * 2002-03-29 2009-10-15 Sutton Ii James A System and method for execution of a secured environment initialization instruction
US8645688B2 (en) 2002-03-29 2014-02-04 Intel Corporation System and method for execution of a secured environment initialization instruction
US20030188113A1 (en) * 2002-03-29 2003-10-02 Grawrock David W. System and method for resetting a platform configuration register
US7069442B2 (en) 2002-03-29 2006-06-27 Intel Corporation System and method for execution of a secured environment initialization instruction
US7546457B2 (en) 2002-03-29 2009-06-09 Intel Corporation System and method for execution of a secured environment initialization instruction
US8185734B2 (en) 2002-03-29 2012-05-22 Intel Corporation System and method for execution of a secured environment initialization instruction
US20050182940A1 (en) * 2002-03-29 2005-08-18 Sutton James A.Ii System and method for execution of a secured environment initialization instruction
US20030191943A1 (en) * 2002-04-05 2003-10-09 Poisner David I. Methods and arrangements to register code
US20030196096A1 (en) * 2002-04-12 2003-10-16 Sutton James A. Microcode patch authentication
US20030196100A1 (en) * 2002-04-15 2003-10-16 Grawrock David W. Protection against memory attacks following reset
US20030196088A1 (en) * 2002-04-15 2003-10-16 Poisner David I. Method and apparatus for communicating securely with a token
US20030196083A1 (en) * 2002-04-15 2003-10-16 Grawrock David W. Validation of inclusion of a platform within a data center
US7058807B2 (en) 2002-04-15 2006-06-06 Intel Corporation Validation of inclusion of a platform within a data center
US7076669B2 (en) 2002-04-15 2006-07-11 Intel Corporation Method and apparatus for communicating securely with a token
US20030217250A1 (en) * 2002-04-16 2003-11-20 Steve Bennett Control register access virtualization performance improvement in the virtual-machine architecture
US7127548B2 (en) * 2002-04-16 2006-10-24 Intel Corporation Control register access virtualization performance improvement in the virtual-machine architecture
US20030204693A1 (en) * 2002-04-30 2003-10-30 Moran Douglas R. Methods and arrangements to interface memory
US7139890B2 (en) 2002-04-30 2006-11-21 Intel Corporation Methods and arrangements to interface memory
US20030229794A1 (en) * 2002-06-07 2003-12-11 Sutton James A. System and method for protection against untrusted system management code by redirecting a system management interrupt and creating a virtual machine container
US6820177B2 (en) 2002-06-12 2004-11-16 Intel Corporation Protected configuration space in a protected environment
US20030233550A1 (en) * 2002-06-18 2003-12-18 Brickell Ernie F. Method of confirming a secure key exchange
US20060245590A1 (en) * 2002-06-18 2006-11-02 Brickell Ernie F Method of confirming a secure key exchange
US7142674B2 (en) 2002-06-18 2006-11-28 Intel Corporation Method of confirming a secure key exchange
US7392415B2 (en) 2002-06-26 2008-06-24 Intel Corporation Sleep protection
US20040003273A1 (en) * 2002-06-26 2004-01-01 Grawrock David W. Sleep protection
US20040003321A1 (en) * 2002-06-27 2004-01-01 Glew Andrew F. Initialization of protected system
US7124327B2 (en) 2002-06-29 2006-10-17 Intel Corporation Control over faults occurring during the operation of guest software in the virtual-machine architecture
US20040003324A1 (en) * 2002-06-29 2004-01-01 Richard Uhlig Handling faults associated with operation of guest software in the virtual-machine architecture
US20040003323A1 (en) * 2002-06-29 2004-01-01 Steve Bennett Control over faults occurring during the operation of guest software in the virtual-machine architecture
US6996748B2 (en) 2002-06-29 2006-02-07 Intel Corporation Handling faults associated with operation of guest software in the virtual-machine architecture
US7296267B2 (en) 2002-07-12 2007-11-13 Intel Corporation System and method for binding virtual machines to hardware contexts
US20040010788A1 (en) * 2002-07-12 2004-01-15 Cota-Robles Erik C. System and method for binding virtual machines to hardware contexts
US20040103281A1 (en) * 2002-11-27 2004-05-27 Brickell Ernie F. System and method for establishing trust without revealing identity
US7454611B2 (en) 2002-11-27 2008-11-18 Intel Corporation System and method for establishing trust without revealing identity
US7165181B2 (en) 2002-11-27 2007-01-16 Intel Corporation System and method for establishing trust without revealing identity
US20070113077A1 (en) * 2002-11-27 2007-05-17 Intel Corporation System and Method for Establishing Trust Without Revealing Identity
US20040117532A1 (en) * 2002-12-11 2004-06-17 Bennett Steven M. Mechanism for controlling external interrupts in a virtual machine system
US20040117593A1 (en) * 2002-12-12 2004-06-17 Richard Uhlig Reclaiming existing fields in address translation data structures to extend control over memory acceses
US7073042B2 (en) 2002-12-12 2006-07-04 Intel Corporation Reclaiming existing fields in address translation data structures to extend control over memory accesses
US7318235B2 (en) 2002-12-16 2008-01-08 Intel Corporation Attestation using both fixed token and portable token
US20040117318A1 (en) * 2002-12-16 2004-06-17 Grawrock David W. Portable token controlling trusted environment launch
US8195914B2 (en) 2002-12-27 2012-06-05 Intel Corporation Mechanism for remapping post virtual machine memory pages
US20040128469A1 (en) * 2002-12-27 2004-07-01 Hall Clifford D. Mechanism for remapping post virtual machine memory pages
US20040128345A1 (en) * 2002-12-27 2004-07-01 Robinson Scott H. Dynamic service registry
US20110131363A1 (en) * 2002-12-27 2011-06-02 Hall Clifford D Mechanism for remapping post virtual machine memory pages
US7900017B2 (en) 2002-12-27 2011-03-01 Intel Corporation Mechanism for remapping post virtual machine memory pages
US20040128528A1 (en) * 2002-12-31 2004-07-01 Poisner David I. Trusted real time clock
US20040128549A1 (en) * 2002-12-31 2004-07-01 Poisner David I. Trusted system clock
US7076802B2 (en) 2002-12-31 2006-07-11 Intel Corporation Trusted system clock
US20050044292A1 (en) * 2003-08-19 2005-02-24 Mckeen Francis X. Method and apparatus to retain system control when a buffer overflow attack occurs
US20050060702A1 (en) * 2003-09-15 2005-03-17 Bennett Steven M. Optimizing processor-managed resources based on the behavior of a virtual machine monitor
US8079034B2 (en) 2003-09-15 2011-12-13 Intel Corporation Optimizing processor-managed resources based on the behavior of a virtual machine monitor
US9971615B2 (en) 2003-09-15 2018-05-15 Intel Corporation Optimizing processor-managed resources based on the behavior of a virtual machine monitor
US7424709B2 (en) 2003-09-15 2008-09-09 Intel Corporation Use of multiple virtual machine monitors to handle privileged events
US20050071840A1 (en) * 2003-09-15 2005-03-31 Gilbert Neiger Use of multiple virtual machine monitors to handle privileged events
US7287197B2 (en) 2003-09-15 2007-10-23 Intel Corporation Vectoring an interrupt or exception upon resuming operation of a virtual machine
US7739521B2 (en) 2003-09-18 2010-06-15 Intel Corporation Method of obscuring cryptographic computations
US20050084098A1 (en) * 2003-09-18 2005-04-21 Brickell Ernie F. Method of obscuring cryptographic computations
US20050086508A1 (en) * 2003-09-19 2005-04-21 Moran Douglas R. Prioritized address decoder
US7610611B2 (en) 2003-09-19 2009-10-27 Moran Douglas R Prioritized address decoder
US7177967B2 (en) 2003-09-30 2007-02-13 Intel Corporation Chipset support for managing hardware interrupts in a virtual machine system
US20050080970A1 (en) * 2003-09-30 2005-04-14 Stalinselvaraj Jeyasingh Chipset support for managing hardware interrupts in a virtual machine system
US7237051B2 (en) 2003-09-30 2007-06-26 Intel Corporation Mechanism to control hardware interrupt acknowledgement in a virtual machine system
US20060036791A1 (en) * 2003-09-30 2006-02-16 Stalinselvaraj Jeyasingh Chipset support for managing hardware interrupts in a virtual machine system
US7366305B2 (en) 2003-09-30 2008-04-29 Intel Corporation Platform and method for establishing trust without revealing identity
US7302511B2 (en) 2003-09-30 2007-11-27 Intel Corporation Chipset support for managing hardware interrupts in a virtual machine system
US8543772B2 (en) 2003-09-30 2013-09-24 Intel Corporation Invalidating translation lookaside buffer entries in a virtual machine (VM) system
US8751752B2 (en) 2003-09-30 2014-06-10 Intel Corporation Invalidating translation lookaside buffer entries in a virtual machine system
US20050069135A1 (en) * 2003-09-30 2005-03-31 Brickell Ernie F. Platform and method for establishing trust without revealing identity
US20050080965A1 (en) * 2003-09-30 2005-04-14 Bennett Steven M. Mechanism to control hardware interrupt acknowledgement in a virtual machine system
US20050108497A1 (en) * 2003-11-14 2005-05-19 International Business Machines Corporation Translation look aside buffer (TLB) with increased translational capacity for multi-threaded computer processes
US7093100B2 (en) * 2003-11-14 2006-08-15 International Business Machines Corporation Translation look aside buffer (TLB) with increased translational capacity for multi-threaded computer processes
US7636844B2 (en) 2003-11-17 2009-12-22 Intel Corporation Method and system to provide a trusted channel within a computer system for a SIM device
US20050108532A1 (en) * 2003-11-17 2005-05-19 Bajikar Sundeep M. Method and system to provide a trusted channel within a computer system for a SIM device
US20050108534A1 (en) * 2003-11-19 2005-05-19 Bajikar Sundeep M. Providing services to an open platform implementing subscriber identity module (SIM) capabilities
US9348767B2 (en) 2003-11-26 2016-05-24 Intel Corporation Accessing private data about the state of a data processing machine from storage that is publicly accessible
US9087000B2 (en) 2003-11-26 2015-07-21 Intel Corporation Accessing private data about the state of a data processing machine from storage that is publicly accessible
US8156343B2 (en) 2003-11-26 2012-04-10 Intel Corporation Accessing private data about the state of a data processing machine from storage that is publicly accessible
US8037314B2 (en) 2003-12-22 2011-10-11 Intel Corporation Replacing blinded authentication authority
US9009483B2 (en) 2003-12-22 2015-04-14 Intel Corporation Replacing blinded authentication authority
US20050133582A1 (en) * 2003-12-22 2005-06-23 Bajikar Sundeep M. Method and apparatus for providing a trusted time stamp in an open platform
US20050137898A1 (en) * 2003-12-22 2005-06-23 Wood Matthew D. Replacing blinded authentication authority
US20050152539A1 (en) * 2004-01-12 2005-07-14 Brickell Ernie F. Method of protecting cryptographic operations from side channel attacks
US8639915B2 (en) 2004-02-18 2014-01-28 Intel Corporation Apparatus and method for distributing private keys to an entity with minimal secret, unique information
US7802085B2 (en) 2004-02-18 2010-09-21 Intel Corporation Apparatus and method for distributing private keys to an entity with minimal secret, unique information
US20050216920A1 (en) * 2004-03-24 2005-09-29 Vijay Tewari Use of a virtual machine to emulate a hardware device
US7356735B2 (en) 2004-03-30 2008-04-08 Intel Corporation Providing support for single stepping a virtual machine in a virtual machine environment
US20050240819A1 (en) * 2004-03-30 2005-10-27 Bennett Steven M Providing support for single stepping a virtual machine in a virtual machine environment
US7620949B2 (en) 2004-03-31 2009-11-17 Intel Corporation Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment
US20050240700A1 (en) * 2004-03-31 2005-10-27 Bennett Steven M Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment
US7861245B2 (en) 2004-03-31 2010-12-28 Intel Corporation Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment
US7490070B2 (en) 2004-06-10 2009-02-10 Intel Corporation Apparatus and method for proving the denial of a direct proof signature
US20050288056A1 (en) * 2004-06-29 2005-12-29 Bajikar Sundeep M System including a wireless wide area network (WWAN) module with an external identity module reader and approach for certifying the WWAN module
US20060005084A1 (en) * 2004-06-30 2006-01-05 Gilbert Neiger Support for nested faults in a virtual machine environment
US7305592B2 (en) 2004-06-30 2007-12-04 Intel Corporation Support for nested fault in a virtual machine environment
US20060075402A1 (en) * 2004-09-30 2006-04-06 Gilbert Neiger Providing support for a timer associated with a virtual machine monitor
US7840962B2 (en) 2004-09-30 2010-11-23 Intel Corporation System and method for controlling switching between VMM and VM using enabling value of VMM timer indicator and VMM timer value having a specified time
US8146078B2 (en) 2004-10-29 2012-03-27 Intel Corporation Timer offsetting mechanism in a virtual machine environment
US20060117181A1 (en) * 2004-11-30 2006-06-01 Brickell Ernest F Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information
US8924728B2 (en) 2004-11-30 2014-12-30 Intel Corporation Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information
US8533777B2 (en) 2004-12-29 2013-09-10 Intel Corporation Mechanism to determine trust of out-of-band management agents
US20060236371A1 (en) * 2004-12-29 2006-10-19 Fish Andrew J Mechanism to determine trust of out-of-band management agents
US20090006805A1 (en) * 2005-01-28 2009-01-01 Anderson Andrew V Method and apparatus for supporting address translation in a virtual machine environment
US7395405B2 (en) 2005-01-28 2008-07-01 Intel Corporation Method and apparatus for supporting address translation in a virtual machine environment
US7836275B2 (en) 2005-01-28 2010-11-16 Intel Corporation Method and apparatus for supporting address translation in a virtual machine environment
US7809957B2 (en) 2005-09-29 2010-10-05 Intel Corporation Trusted platform module for generating sealed data
US8014530B2 (en) 2006-03-22 2011-09-06 Intel Corporation Method and apparatus for authenticated, recoverable key distribution with no database secrets
US8028062B1 (en) * 2007-12-26 2011-09-27 Emc Corporation Non-disruptive data mobility using virtual storage area networks with split-path virtualization

Also Published As

Publication number Publication date
JPS61206057A (en) 1986-09-12

Similar Documents

Publication Publication Date Title
US4802084A (en) Address translator
CA1134052A (en) Address control system for software simulation
KR100624668B1 (en) Method for resolving address space conflicts between a virtual machine monitor and a guest operating system
US4814975A (en) Virtual machine system and method for controlling machines of different architectures
US4779188A (en) Selective guest system purge control
US4400769A (en) Virtual machine system
US7886127B2 (en) Methods for accessing multiple page tables in a computer system
US4459661A (en) Channel address control system for a virtual machine system
US5317754A (en) Method and apparatus for enabling an interpretive execution subset
US4821184A (en) Universal addressing system for a digital data processing system
US20020046305A1 (en) Method for effective binary translation between different instruction sets using emulated supervisor flag and multiple page tables
KR900005299A (en) Virtual calculator system
JPH04247528A (en) Common access device and method into data space
EP0145960B1 (en) Selective guest system purge control
EP0619898A1 (en) Computer system with two levels of guests
US5226132A (en) Multiple virtual addressing using/comparing translation pairs of addresses comprising a space address and an origin address (sto) while using space registers as storage devices for a data processing system
US11409531B2 (en) Processor having multiple operating modes
JPS61160160A (en) Addressing control device of virtual computer
US11288207B2 (en) Apparatus and method for processing address translation and invalidation transactions
JPS6336012B2 (en)
JP3125790B2 (en) Address translator
JPS5911944B2 (en) Virtual machine simulation method
JPH0412861B2 (en)
JP2980327B2 (en) Instruction processing unit
JPS6273346A (en) Address converter

Legal Events

Date Code Title Description
AS Assignment

Owner name: HITACHI, LTD., 6, KANDA SURUGADAI 4-CHOME, CCHIYOD

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST.;ASSIGNORS:IKEGAYA, HIROSHI;UMENO, HIDENORI;KUBO, TAKASHIGE;AND OTHERS;REEL/FRAME:004515/0448

Effective date: 19860128

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

FPAY Fee payment

Year of fee payment: 8

FPAY Fee payment

Year of fee payment: 12